Back to Search Begin New Search Save Search Auto-Notify
SANS ICS Houston Summit & Training
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses. Why I...
June 1-5, 2015
Organizer: SANS Institute
Location: Houston, TX
Add Favorite
SANS Pen Test Austin 2015
We have a really special event brewing for you at SANS Pen Test Austin 2015, and you've gotta check it out. Every organization needs skilled people who know how to find vulnerabilities, understand risk, and help prioritize resources based on mitigating potential real-world attacks. That's what SANS Pen Test Austin is all about! If you like to break things, put them back together, find out how they work, and mimic the actions of real-world bad...
May 18-23, 2015
Organizer: SANS Institute
Location: Austin, TX
Add Favorite
SANS/NH-ISAC Healthcare Cybersecurity Summit
SummitChairman: Jim Routh & Frank KimSummit Dates: May 12-13, 2015Training Dates: May 14-19, 2015SANS and the National Health Information Sharing & Analysis Center (NH-ISAC) are pleased to announce the 3nd Annual Healthcare Cyber Security Summit. Healthcare is undergoing major changes. Patients are demanding more convenient and personalized care. Digital health is changing the way that doctors and patients interact. New technologies al...
May 12-19, 2015
Organizer: SANS Institute
Location: Atlanta, GA
Add Favorite
(ISC)² CyberSecureGov
Join us for an insightful two days as cybersecurity experts from government, industry, and academia share on how to maximize resources in order to keep pace with cyber threats. Attendees will gain an in-depth knowledge on what new threats —and solutions— are emerging, the future legislative and political landscape, funding new initiatives in a post-sequestration reality, effectively adopting federal security initiatives and guidanc...
May 14-15, 2015
Organizer: (ISC)²
Location: Washington, DC
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
SANS Security Operations Center Summit...
As we see regularly in the news, the number of successful data breaches continues to increase. Adversaries seem to have the upper hand, as many organizations fail to effectively detect and quickly respond to these breaches. Over 80% of all breach victims learn of a compromise from third-party notifications, not from internal security teams, and are often caught by surprise. As a result, executives are demanding that their security teams provid...
April 24 - May 1, 2015
Organizer: SANS Institute
Location: Arlington, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
April 30, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
The Video Vortex
Video surveillance data is growing – fast. By 2020, video surveillance is expected to reach approximately 3.3 trillion captured video hours globally. Organizations’ appetites for video surveillance in an "always-on" world are straining IT infrastructures – from networks, to storage, to analysis capabilities. Attend “The Video Vortex” webinar to discuss: How agencies can optimize video surveillance data insights Po...
April 23, 2015
Organizer: MeriTalk
Location: Webcast
Add Favorite
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search